Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

You make the various hardware modules security context aware. You then give the host a separate security context from guests. You need a trusted hypervisor to bootstrap it.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: